In this edition, four ISMG editors discuss important cybersecurity issues, including how virtual currency Monero is becoming the main alternative to Bitcoin as the crypto choice for criminals, the challenges involved in an identity-centric Zero Trust approach and how to influence change in culture.
How does one decide the right approach to zero trust, and what are some important considerations to keep in mind? A panel of experts - Brett Winterford, Chirag Joshi and Jay Hira - share their in-depth views and discuss issues including how to take an identity-centric zero trust approach.
During its January cyberattack, Lapsus$ accessed tenants and viewed applications such as Slack and Jira for only two Okta customers. The threat actor actively controlled a single workstation used by a Sitel support engineer for 25 consecutive minutes on Jan. 21, according to a forensic report.
This whitepaper looks at ways you can use CIAM to strengthen the perimeter around your customer data. From fine-tuning the balance you achieve between security, privacy for your customers, and the user experience they get when visiting your site to consolidating your user data into a single source of truth, CIAM can...
There are numerous threats targeting identity systems. Are you familiar with them all? In the first four months of 2021 alone, Auth0 observed more than 87,000 attempts to brute force multifactor authentication. For the inaugural State of Secure Identity report, Auth0 shares insights from our own trends and analysis to...
Identity experts urge the Biden administration to accelerate the deployment of mobile driver's licenses and ensure identity theft victims get direct assistance. These are among the four items experts say must be added to an upcoming executive order focused on preventing and detecting identity theft.
Private equity giant Thoma Bravo has agreed to purchase identity security powerhouse SailPoint for $6.9 billion in the sixth-biggest cybersecurity acquisition of all time. The deal will give SailPoint the flexibility needed to support its customers, expand its markets and accelerate innovation.
Ditch the old “castle-and-moat” methods. Instead, focus on critical access points and assets, making sure each individual point is protected from a potential breach.
Lower your risk in multi cloud setup by adopting a set of security considerations and best architectural principles. Multi cloud is very much a reality for today’s enterprises, and running multi cloud does not have to be challenging and expensive. In this talk, the speakers will share their experience in developing...
Hackers are exploiting third-party remote access. If you’re not taking third-party risk seriously, it’s just a matter of time until your company is the next headline.
When acclaimed bank robber Willie Sutton was captured, a reporter inquired as to why he robbed banks. His simple answer was "because that's where the money is”. With advances in technology, it is plausible to “virtually” rob banks without involving weapons, but rather by a simple computer keystroke.
This...
New BeyondTrust CEO Janine Seebeck plans to help privileged users protect themselves by applying machine learning to detect patterns in the data generated across BeyondTrust's 20,000 customers. She starts as BeyondTrust's CEO July 1 and replaces Matt Dircks, who has led the company since 2014.
Strengthen Your Security By Learning Where You're Vulnerable
The global pandemic spurred a digital revolution. From purchasing goods and services, to visiting their healthcare providers, to working and learning from home, people doubled the amount of time spent online. Not surprisingly, with this massive digital...
Learn and Differentiate Capabilities for Customer Identity and Access Management (CIAM)
Eight global digital transformation and consumer trends are influencing business in 2022. For enterprise-level organizations, these trends necessitate a different approach to customer identity and access management (CIAM).
This...
Why Consumer Identity and Access Management (CIAM) Is Imperative
Having your finger on the pulse of trends helps you make strategic decisions that put you ahead of the competition. None could be more important than eight global digital transformation and consumer trends influencing business in 2022.
The eight global...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.